Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- # Nmap 7.80 scan initiated Fri Dec 13 02:28:15 2019 as: nmap -Pn -sV --script vuln -p135,445,3389,49154 -oN nmap/Vulns.nmap 10.0.0.200
- Nmap scan report for 10.0.0.200
- Host is up (0.00021s latency).
- PORT STATE SERVICE VERSION
- 135/tcp open msrpc Microsoft Windows RPC
- |_clamav-exec: ERROR: Script execution failed (use -d to debug)
- 445/tcp open microsoft-ds Microsoft Windows Server 2008 R2 microsoft-ds (workgroup: WORKGROUP)
- |_clamav-exec: ERROR: Script execution failed (use -d to debug)
- 3389/tcp open ssl/ms-wbt-server?
- |_clamav-exec: ERROR: Script execution failed (use -d to debug)
- |_sslv2-drown:
- 49154/tcp open msrpc Microsoft Windows RPC
- |_clamav-exec: ERROR: Script execution failed (use -d to debug)
- MAC Address: 08:00:27:FE:7A:FB (Oracle VirtualBox virtual NIC)
- Service Info: Host: PRIMARYDC; OS: Windows; CPE: cpe:/o:microsoft:windows, cpe:/o:microsoft:windows_server_2008:r2
- Host script results:
- |_samba-vuln-cve-2012-1182: Could not negotiate a connection:SMB: Failed to receive bytes: TIMEOUT
- | smb-vuln-cve2009-3103:
- | VULNERABLE:
- | SMBv2 exploit (CVE-2009-3103, Microsoft Security Advisory 975497)
- | State: VULNERABLE
- | IDs: CVE:CVE-2009-3103
- | Array index error in the SMBv2 protocol implementation in srv2.sys in Microsoft Windows Vista Gold, SP1, and SP2,
- | Windows Server 2008 Gold and SP2, and Windows 7 RC allows remote attackers to execute arbitrary code or cause a
- | denial of service (system crash) via an & (ampersand) character in a Process ID High header field in a NEGOTIATE
- | PROTOCOL REQUEST packet, which triggers an attempted dereference of an out-of-bounds memory location,
- | aka "SMBv2 Negotiation Vulnerability."
- |
- | Disclosure date: 2009-09-08
- | References:
- | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3103
- |_ http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3103
- |_smb-vuln-ms10-054: false
- |_smb-vuln-ms10-061: Could not negotiate a connection:SMB: Failed to receive bytes: EOF
- Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
- # Nmap done at Fri Dec 13 02:30:12 2019 -- 1 IP address (1 host up) scanned in 117.29 seconds
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement